No Silver Lining: Information Leakage in Cloud Infrastructures

Abstract:

As more businesses and individuals migrate their workloads to cloud infrastructures, many are unaware of a potential issue inherent in these systems: information leakage, the potential inadvertent release of data through a Virtual Machine (VM) to another VM, which then transfers the information to a third party. An assumption is that there is no interaction between multiple VMs, even if they reside within the same cabinet. Unfortunately, this is not true. This paper pres- ents a selected history of VM information leakage via various covert timing channel attacks and shows that over time the practicality of these attacks is increasing.


AUTHORS

Photo of Dr. William R. Mahoney

School of Interdisciplinary Informatics University of Nebraska at Omaha, Nebraska,
USA

Dr. William R. Mahoney received his B.A. and B.S. degrees from Southern Illinois University, and his M.A. and Ph.D. degrees from the University of Nebraska Lincoln. He is a Professor in the College of Information Science and Technology in the School of Interdisciplinary Informatics at the University of Nebraska at Omaha. His primary re-search interests include language compilers, hardware and instruction set design, and code generation and optimisation, as these topics relate to cybersecurity goals. As such, his interests are in areas such as code obfuscation, reverse engineering and anti-reverse engineering techniques, and vulnerability analysis. Industrial control systems are a specific target of these research areas. Prior to working at the Kiewit Institute, Dr. Mahoney worked for 20+ years in the computer design industry, specifically in the areas of embedded computing and real-time operating systems. During this time, he was also on the part-time faculty of the University of Nebraska at Omaha.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com